Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento con las normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Folleto

Brochure: McAfee Product Security Practices

Learn about McAfee's agile security development lifecycle (SDL).

Resumen de la solución

SIA Solution Brief: Interset

User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.

Resumen de la solución

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Ficha técnica

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Ficha técnica

McAfee Data Loss Prevention (DLP) 6600 Specifications Sheet

This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.

Libro blanco

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.

Resumen de la solución

Don't be Blinded by Encryption: Enable Compliance & Productivity (SSH)

CryptoAuditor from SSH Communications Security, when coupled with McAfee Web Gateway, stops both accidental and malicious data loss over encrypted channels in real time.

Resumen de la solución

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

Resumen de la solución

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Ficha técnica

Migration Table for IBM XGS and GX to McAfee NSP Data Sheet

IBM is leaving the network intrusion prevention arena effective December 31, 2017. This table will guide IBM XGS and IBM GX customers to an improved solution leveraging McAfee Network Security Platform technology.

Reporte

Beyond the General Data Protection Regulation (GDPR): Data residency insights from around the world

As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

Reporte

Beyond the General Data Protection Regulation Executive Summary

McAfee surveyed 800 senior business professionals across eight countries from a range of industry sectors to better understand the factors driving data decision-making and how organizations currently approach data management, protection and residency.

Infografía

Automation and Orchestration Solution to SOC Overload

Market studies say automate first, then orchestrate. In lab tests, IDC validated that 50-100% of actions taken during integrated threat defense solution scenarios were fully automated.

Reporte

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Infografía

Threat Report September 2017 Key Findings

See a visual representation of our researchers’ key findings from the September 2017 report.

Resumen de la solución

Protecting Against Script-Based Malware

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.

Resumen de la solución

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.

Libro blanco

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Reporte

Building Trust in a Cloudy Sky - Healthcare Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

Infografía

Building Trust in a Cloudy Sky Global Views from Financial Services Organizations

This infographic explains how 99% of financial organizations have adopted cloud, but not all of it is sanctioned by IT.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top